SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What requirements needs to be met to use network level authentication?
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
To another hard disk in the same computer - network or to removable media.
Yes
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
2. What is Aero Shake?
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
A processor that supports the hardware virtualization using either the AMD-V or Intel VT options. 256MB of RAM is dedicated to the XP client so the Windows 7 computer should have at least 2GB of overall RAM. Windows XP Mode is only available in Windo
Default Programs Control Panel applet
They can place quotas on folders/volumes - activity screen files - and generate comprehensive storage reports. This assists in not only monitoring existing resource but helping on future planning.
3. How do you remove a resource record from a zone file?
Used to control power settings and configure computers to default to Hibernate or Standby modes. For example - running Powercfg.exe -energy will analyze the computer for energy efficiency.
Either from wbadmin or windows server backup.
Use dnscmd /recorddelete
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
4. What is a mx record?
Windows 7 Enterprise and Ultimate Editions
The command used to preform an offline defrag. Example: jetpack DHCP.mdb temp.mdb
They must be configured with the ip addresses of the radius server.
A roecord to indicate the smtp server.
5. What does Reliability Monitor display?
Divide up a large WIM file into multiple smaller .SWM files
Problem history but also application installation history.
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
The domain profile not the public or private.
6. How do you review files in the Offline Files Cache?
Create persistent connections to computers with POWERSHELL
Windows XP and Server 2003.
In the registry. To bind to another computer remotly the remote registry service needs to run on the target PC.
Use SYNC Center
7. What does Credential Manager allows you to store?
Suggested Sites
Also known as root scalability mode. Allows organizations with more than 16 namespace servers use consistency mode. They poll the nearest dc every hour instead of the pdc emulator. This reduces network traffic to the pdc emulator but clients might ha
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
It improves performance
8. How do you secure a WSUS connection to a remote SQL server?
3389
Increase the SOA refresh interval parameter.
IPSEC
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
9. What is Bootsect.exe?
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
Configure the enforcement points as RADIUS clients.
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
10. What protocol does Ping uses?
The ICMP protocol.
Perform an offline migration
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
Setup a GlobalNames zone.
11. How does transparent caching work?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. How do you upgrade windows vista to windows 7?
Create persistent connections to computers with POWERSHELL
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
By creating or modifying a wireless connection in Network and Sharing Center.
13. How do you verify that an Auto Update Client is connecting to its WSUS Server?
For the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
SP3
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Scan through the %WinDir%WindowsUpdate.log (ie. C:WindowsWindowsUpdate.log) file.
14. How many bits are in the GLOBAL/UNIQUE LOCAL prefix?
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
Use dnscmd /zonerefresh.
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
They are in the first 48 bits /48
15. What do you do if a computer is missing the data recovery agent certificate for the EFS recovery agent?
Does not have
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
Use the Import Foreign Disk option on the target computer
Export and import it from another computer.
16. What does the PSCONSOLEFILE option in POWERSHELL do?
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
Does not
Create a customized shell
Clear the content being cached
17. What is PSR.EXE?
IPSEC
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
18. What is a split tunnel VPN?
Deploy a secondary zone.
A network policy server. It is microsofts implementation of RADIUS server and replaces the IAS (internet authentication service) from windows 2003.
Us edit dnscmd /zoneupdatefromdns command.
It is where Internet access is direct and not routed through the VPN - configure advanced TCPIP network properties and uncheck the option "Use Default Gateway on Remote Network".
19. What OSs can IPV6 be uninstalled?
L2TP uses IPSEC to encrypt VPN traffic - PKI is needed to issue certificates that are required by IPSEC.
From the Network Policy Access Services role in system manager.
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
Windows XP and Server 2003.
20. How does Transparent Caching lead to improved end-user response times and decreased bandwidth consumption over the WAN links to the server?
A CONFIG.XML file
Comes with the Windows Automated Installation Kit (WAIK)
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
By caching reads to remote files over a slow network in the Offline Files (CSC) cache. Subsequent reads to the same file are then satisfied from the client (cache) after verifying the integrity of the cached copy.
21. How do you install RRAS?
A LAN Router only or a LAN to WAN Router
On a core server
From the Network Policy Access Services role in system manager.
It designates an authoritative DNS server - not the soa record.
22. What protocol does NAP enforce when used in 802.1x authentication?
WPA-Personal (uses a preshared key)
No they are disabled
EAP protocol.
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
23. What do you modify to define CD Autoplay settings and file associations?
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
Default Programs Control Panel applet
Use AD integrated zones so the clients can update to more than one DNS server.
The latest Vista Service Pack
24. What does "wbdadmin -startrecovery -version" do?
Problem history but also application installation history.
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
Specified the version identifer of the back to recover in MM?DD/YYYY-HH:MM format. If the version is unknown wdadmin will get the version.
DHCP server cannot assign an ip address
25. Direct Access requires...
Se a capture filter based on the mac address of the problem PC.
It sees if your PC is ready for Windows 7. It scans your hardware - devices - and installed programs for known compatibility issues - gives you guidance on how to resolve potential issues found - and recommends what to do before you upgrade.
A network location.
Computer certificates be installed on client computers
26. How can non Microsoft PCs connect to print services?
Specify this file with both the ScanState and LoadState commands to migrate user folders - files - and file types to computers running Windows Vista or Windows 7.
Print services for unix can be configured to share out with the LPD (Line Printer Daemon) and clients send print jobs to LPD using LPR (Line printer remote) client software.
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
wbadmin.exe. This can backup critical files.
27. What does IP Helper service has to run for?
IPV6 transition technologies
Internet printing protocol. Used for connecting to printers via web browser.
Ping the Link Local Address (FE80 Address)
Where you go to manage your documents - music - pictures - and other files. You can browse your files the same way you would in a folder - or you can view your files arranged by properties like date - type - and author. In some ways - a library is si
28. Wireless profiles _____________ - the PC needs to be connected to the LAN first.
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
Can be configured through a GPO
Contains a list of dynamically updated list of authorities for the zone.
Use IPV6 Unique Local Addresses.
29. What is a reservation?
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
Set IE back to its default settings
A way of assigning a staic address based on the mac address. This ensures each time the client receives the same address.
NMCAP. You can initiate a packet capture and make a .cap file to replay later. It allows you to accept a .cap files as input useful in parsing traffic by different ports or ip address. Example: NMCap /inputcapture test.cap /capture IPV4.Address ==10.
30. What does running network monitor in PMode do?
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.
On a core server
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
31. What does DISM /UNMOUNT-WIM /COMMIT do?
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
MSCHAP2 is user/password authentication while EAP-TLS is comuter authentication via certificate or smart card.
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
32. How do you repartition your hard disk by using the Shrink feature in Disk Management?
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
If you are logged in as an administrator you can shrink an existing partition or volume to create unallocated disk space - from which you can create a new partition or volume. You can shrink a volume even on a Basic Disk.
By running the Update Status summary report.
Updates the master boot code for hard disk partitions to switch between BOOTMGR and NTLDR. You can use this tool to restore the boot sector on your computer. This tool replaces FixFAT and FixNTFS.
33. What is Oscdimg?
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
It is a security component that enables users to perform common tasks as non-administrators - called standard users in Windows 7 - and as administrators without having to switch users - log off - or use Run As.
It can speed up your computer by using storage space on most USB flash drives and flash memory cards. ReadyBoost is designed to help when your PC's memory is running low. Low memory can make your computer sluggish because Windows - which needs a plac
34. Does the Advanced Firewall already has a predefined Homegroup inbound rule?
Sett up a priority for the preferred smtp server.
The first time a user opens a file in a shared folder - Windows 7 reads the file from the server and then stores it in a cache on the computer's hard disk drive. The second and subsequent times a user reads the same file - Windows 7 retrieves the cac
Yes - it can be modified to apply to a network location.
Use IPV6 Unique Local Addresses.
35. What type of drives can Software RAID 0 -1 -5 can only be implemented on?
Problem history but also application installation history.
dynamic drives
WPA2 and 802.1x but require EAP-TLS to be enable.
Configure aging and scavenging.
36. How do you initiate a zone transfer?
It contains new capabilities and extensions that you can: Define rules based on file attributes - Create exceptions to rules - Import and export rules - and use audit-only mode.
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Configure the enforcement points as RADIUS clients.
Use dnscmd /zonerefresh.
37. What do Print permission only allows?
Credentials - such as user names and passwords that you use to log on to websites or other computers on a network. By storing your credentials - Windows can automatically log you on to websites or other computers. Credentials are saved in special fol
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Some information—such as cookies and temporary Internet files—so that the webpages you visit will work correctly. However - at the end of your InPrivate Browsing session - this information is discarded.
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
38. What does MISEXEC.EXE do?
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
Install Windows Installer Packages (.MSI) files. You can script the installation.
It is a network health policy defines the minumum level of client health required to connect to the network.
The Application Identity Service
39. What does Microsoft Transform files (MST) do?
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
Comes with the Windows Automated Installation Kit (WAIK)
Only a local administrator
For example - you can create rules based on the publisher attribute that is persistent through updates - or you can create rules for a specific version of a file.
40. NAP can be configured to ____________.
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
Use IPCONFIG or Status Details for the Network Connection.
Enforce IPSEC on the network
It sees if your PC is ready for Windows 7. It scans your hardware - devices - and installed programs for known compatibility issues - gives you guidance on how to resolve potential issues found - and recommends what to do before you upgrade.
41. What service has to be started for Applocker to work?
The Application Identity Service
L2TP/IPSEC with EAP-TLS.
The DHCP server will ping an ip address before assigning it.
Can be configured through a GPO
42. ________________ can be replicated through Ad replication.
They relay the status on polices to the Security center for NAP to validate the system to use the network.
Conditional forward
Internet Protocol security (IPsec) and Internet Protocol version 6 (IPv6).
Use SYNC Center
43. What is NAP's security health validator?
Does not
Create a Custom Rule. By default Predefined Firewall Rules apply to all computers sending network traffic.
It can be configured to to state the minimum level of system health. Example: To require or not require anitvirus - antipiracy - or firewall to connect to the network.
A scheduled task that runs by default collecting information for the Reliability monitor. If disabled it must reenabled manually from the task scheduler mmc snapin.
44. If you wanted to encrypt the connection between a client PC and the WSUS server what would you use?
Tools adds out-of-box drivers to a booted Windows PE image. It takes one or more driver .inf files as inputs.
Through a GPO.
SSL
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
45. There is a RESET option in Internet Explorer to...
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
Set IE back to its default settings
Contains a list of dynamically updated list of authorities for the zone.
46. How do you configure DHCP to ignore clients on a particular subnet?
By unbinding the DHCP protocol from the nic attached to the subnet.
Devices and Printers Control Panel applet has a
Either from wbadmin or windows server backup.
It is the authentication header protocol and digitally sign packets but not encrypt them.
47. What can NAP do?
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
Encapsulating Security payload protocol used for encryption the packets created by the AH.
Place unhealthy computers in a quarantined network and auto-remediate clients.
48. What does DISM /Get-Drivers do?
Can be used to create virtual hard disks
Windows 7 Enterprise and Ultimate Editions
Used to get a list of installed 3rd party drivers
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
49. How do you restore individual files?
Either from wbadmin or windows server backup.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
Vista SP1 and Server 2008 and above.
Restrict the share permissions of the DFS root share.
50. How do you upgrade windows 7?
Pool Active Directory.
Use the net sh command to configure the proper ports for remote management.
All you have to do is purchase an upgrade key from Microsoft or another authorized retailer to unlock those new features.
A new feature in Windows 7 and Windows Server 2008 R2 that replaces the Software Restriction Policies (SRP) feature. One of the advantages of Applocker rules over SRP is you can assign a rule to a security group or an individual user.